← Back to CVEs
CVE-2023-39320
CRITICAL9.8
Description
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/8/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
golang:go
Weaknesses (CWE)
CWE-94
References
https://go.dev/cl/526158(security@golang.org)
https://go.dev/issue/62198(security@golang.org)
https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ(security@golang.org)
https://pkg.go.dev/vuln/GO-2023-2042(security@golang.org)
https://security.gentoo.org/glsa/202311-09(security@golang.org)
https://security.netapp.com/advisory/ntap-20231020-0004/(security@golang.org)
https://go.dev/cl/526158(af854a3a-2127-422b-91ae-364da2661108)
https://go.dev/issue/62198(af854a3a-2127-422b-91ae-364da2661108)
https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ(af854a3a-2127-422b-91ae-364da2661108)
https://pkg.go.dev/vuln/GO-2023-2042(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202311-09(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20231020-0004/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.